- Configuration Auditing: Supports teams responsible for security, or anyone new to the cloud, by ensuring their configuration adheres to policy and industry best practices, alerting users when a change occurs or an asset becomes non-compliant.
- Continuous Monitoring and Alerting: Supports security and operations teams by monitoring users, processes, network connection, file access and all installed packages for known vulnerabilities. Provides tight integrations with existing Operations tools including PagerDuty and Slack to increase time to detection and remediation.
- Security Incident Investigation: Supports organizations with dedicated security teams by providing real-time access to advanced, context-based data about the security environment, allowing teams to automatically recreate security events for faster analysis and resolution.
Threat Stack Launches Configuration Auditing to Enable Customers to Achieve Security Best Practices at Any Level in Their Cloud Security Journey
Launched at AWS re:Invent 2016, New Configuration Auditing Capabilities Broaden Cloud Security Platform
Threat Stack, a leader in cloud-native security and compliance management, today announced the release of Configuration Auditing, a major new feature of the Threat Stack Cloud Security Platform® (CSP). With this release, unveiled at AWS re:Invent 2016, Threat Stack is the only cloud security monitoring platform on the market to enable customers to assure their Amazon Web Services (AWS) environment is configured to policy, and from there implement continuous security monitoring, alerting and investigation at any stage in the company’s cloud maturity. “As a rapidly growing company, we needed a cloud security platform that would help us get started with AWS security best practices, and automatically scale with us as our business continues to expand,” said Bibek Galera, Head of Infrastructure Security, Zuora. “Threat Stack CSP is one of the few security solutions available that was designed to automatically scale with us, providing continuous multi-dimensional visibility into user, workload and infrastructure behaviors through every stage of our cloud journey – from where we are now to where we are heading.” The new Configuration Auditing capability helps Threat Stack customers operating in AWS implement AWS security best practices by automatically auditing current environments and providing an immediate, concise report of configurations that are non-compliant with best practices. Threat Stack then offers steps to remediate the issues and make the AWS environment more secure. Whether a company is just transitioning to the cloud, well-established in the cloud or has built its business in the cloud from day one, it is critical to integrate continuous security monitoring into its environment to assure immediate detection of anomalous or suspicious behavior. Threat Stack is a cloud-based security provider that partners with customers of all sizes and levels of cloud maturity to enable this visibility and to protect against external attacks, insider threats and data loss. Unlike point solutions available today, Threat Stack CSP assures integrated and contextualized security through each stage of the cloud security journey by providing: